Distributed Agent Based Model for Intrusion Detection System Based on

Size: px
Start display at page:

Download "Distributed Agent Based Model for Intrusion Detection System Based on"

Transcription

1 Distributed Agent Based Model for Intrusion Detection System Based on Artificial Immune System 1 Farhoud Hosseinpour, 2 Sureswaran Ramadass, 3 Andrew Meulenberg, 4 Payam Vahdani Amoli and 5 Zahra Moghaddasi *1, 2, 3 National Advanced IPv6 Centre (NAv6),Universiti Sains Malaysia, Malaysia, {farhoud; sures; andrew}@nav6.usm.my 4 Faculty of Information Technology, University of Jyväskylä, 40100, Jyväskylä, Finland, pavahdan@student.jyu.fi 5 Faculty of computer science and information technology. University of Malaya, Malaysia, mzahra@siswamail.um.edu.my Abstract With mounting global network connectivity, the issue of intrusion has achieved importance, promoting active research on efficient Intrusion Detection Systems (IDS). Artificial Immune System (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security. Because of its unique features, (self-learning, self-adaptation and selfimprovement), AIS has been utilized to design new anomaly base IDS. In this paper we have introduced a new distributed, agent based design of AIS based IDS. In our model detectors are distributed in each host in network while the central engine is located in server which manages the detectors and make final decision about current intrusion based on previous experience of all of the hosts in network. In our purposed model detector agents in each host is actively updated and synchronized with detector agents of other hosts through our IDS s central engine. Keywords: AIS, IDS, Distributed, Agent, Danger Theory 1. Introduction Artificial Immune System (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security. AIS is defined as [3] Adaptive systems, inspired by theoretical immunology and observed immune functions, principles and models, which are applied to problem solving. Akin to other bio-inspired models such as genetic algorithms, neural networks, evolutionary algorithms and swarm intelligence [1], AIS is inspired from human immune system (HIS) which is a system of structures in human body which recognizes the foreign pathogens and cells from human body cells and protects the body against diseases [2]. The unique features of dynamic, diversity, distributed, parallel management, self-organization, self-learning and self adaptation [4,7,10] encourage the researchers to employ these techniques in a variety of applications. One basic and significant feature of AIS is self and non-self discrimination [9, 10] which makes it a precise technique to be used for anomaly detection in intrusion detection systems. Like HIS which protects the human body against the foreign pathogens, the AIS suggests a multilayered protection structure [12, 14] for protecting the computer networks against the attacks. Consequently it has been focused by network security researchers to utilize and optimize the new generation of IDS. In this paper we propose a distributed framework for intrusion detection system based on artificial immune system by utilizing genetic algorithm to enhance the secondary immune response. In this framework after training the detectors using negative algorithm, they are distributed to each host as an agent of main IDS engine. This facilitates the detection process and increases the detection performance by decreasing the processing load in the IDS central engine, contrary to centralized mode. The uniqueness of this work is the distribution of both of primary and memory cell detectors to each host while using the genetic algorithm for evolution of the memory cells. The rest of the paper is organized as the following. In section 2, a brief history of AIS is presented, in section 3, we review the related works. In section 4, we describe our proposed framework and all its components and finally there is conclusion in section Related Works Different frameworks have been presented by several authors in utilization of AIS in intrusion detection systems. There are essentially two approaches for applying AIS. One approach is classical International Journal of Digital Content Technology and its Applications(JDCTA) Volume7,Number9,May 2013 doi: /jdcta.vol7.issue

2 self/non-self discrimination and another one is the application of danger theory as a substitute to previous approach [8] Self/non-Self Discrimination The artificial immune system has the capability to differentiate between the self (the cells which are owned by the system) and non-self space (foreign entities to the system) obtained by T-cells which are a set of non-self reactive detectors. A negative Selection algorithm is proposed by Forrest [9] which presents a framework to discriminate between self and non-self entities. In this algorithm, at first a set of detectors are produced and then are compared with a set of normal sets (self), to make sure that none of the detectors are reactive to self-data. If any of detectors are matched with any self entity, the system will eliminate them and the rest will be kept [9]. Hofmeyr and Forrest [10] developed the first lightweight intrusion detection system (LISYS) based on AIS. They believe that unlike the other immunology s rhetorical model AIS typically constructed as agent-based models (ABM). LISYS is a network IDS which utilizes the negative selection algorithm. In these IDS, TCP connections are inspected and categorized to normal and anomalous connections. They simulate the chemical bound which are made between the protein chains as fixed length binary strings for self and non-self discrimination in AIS. Kannadiga and Zulkernine [15] utilized mobile agents for developing a distributed IDS. This innovation leads to reduction of the network bandwidth usage by migrating the detectors and computational entities to each suspected host. Tan et al. [14] proposed a multi-layered structure which consists of detection, defense and user layers. Divyata Dal et al. [17] developed an IDS by utilizing the genetic algorithm for evolution of the detectors to form the primary Immune Response to generate the memory cells. They tried to enhance the Forrest and Hofmeyr s work by applying Genetic algorithm for enhancing the secondary immune response of the AIS without human involvement. Their proposed model was basically a centralized network based on IDS with the capability of anomaly detection. This work has the disadvantage of central processing for massive processes of each packet passing through network. In this paper we proposed a distributed multi-layered framework to enhance the detection performance and efficiency of the IDS Danger Theory As a substitute to self/non-self discrimination, Danger Model was proposed by Matzinger [11, 18]. According to this hypothesis the main cause of an immune response is that a photogene harms the system and thus it is dangerous and not being unknown to the system. The Danger Model works on the premise that the main director of the immune system includes the body s tissues and not the immune cells. The chemical danger signals are released by the distressed tissues to rouse the immune response whereas the calming or self signals are released by healthy tissues which provide the tolerance for the immune system [19]. The idea of utilizing the Danger Theory Model for constructing the next generation of artificial immune system based on IDS was proposed by Aickelin et al. [21]. They stated that in IDS paradigm the danger is sensed and measured automatically after some number of intrusions because of the damage that is caused by attack. Once a danger signal is detected, it will be transmitted to the nearest artificial antigens around the danger area. Fu and his followers [12] proposed a four-layer model based on DT and AIS: Danger sense layer (DSL), danger computing layer (MCL), immune response layer (IRL) and spot disposal layer (SDL). In this model, each layer works independently while cooperating with other layers. Ou et al. [22] proposed a model based on multi-agent structure by utilizing danger theory for IDS. They use agents as entities with an ability to intelligently communicate and detect intrusions. 3. Proposed IDS Framework and Components Proper IDS design is essential to improve the performance of the IDS. Failure of an appropriate design will lead to reduction of detection capability of the IDS. Our proposed architecture essentially is a distributed multi-agent based design for IDS, which utilizes the genetic algorithm for evolving memory cell detectors. Figure 2, shows the fundamental design of our proposed AIS-based IDS, which consists of two main components: IDS central engine and detection sensors. IDS Central Engine is located in the 207

3 gateway of each LAN and Detection Sensors are located in each host in the network. Each of these components is composed of some agents that correlate with each other in order to detect the anomalies and intrusions. Our design goal is to decrease the detection time for each connection by distributing the detectors to each host. Consequently, the processing overhead will be divided between each host and each host will be responsible for its own traffic. Thus, instead of checking all passing traffic, which would impose a high processing overhead and detection time, the central engine will only be responsible for analyzing the reposted information. Figure 2. Architecture overview of proposed IDS 3.1. IDS Central Engine The Central Engine is composed of two main modules, Training and Detection modules, which carry out four main tasks: Training the primary detectors Analyzing the reported data Generating Memory Cell detectors Distributing and synchronizing the detector sets in each host Each module consists of some software agent that performs a special task. The training module, composed of Convertor Agent and Trainer Agent, has responsibility of training the primary random detectors in the early stage of a system s running time. The detection module is composed of an Analyzer Agent and a Dispatcher Agent. The former analyzes the reported data from each host and, under some conditions, generates memory cells by evolving primary activated detectors. The latter distributes and synchronizes the detector sets in each host Convertor Agent The data used to evaluate the system is DARPA 1998, a standard dataset from Lincoln Laboratory off-line intrusion detection evaluation. This set includes real instances of attack sessions that are used to evaluate intrusion detection systems. Prior to the evaluation, a set of training data is used to configure intrusion detection system and to set the parameters. This includes a set of self and non-self data that are used to train and test the IDS. In order to process the network packets, we need to convert the information of all packets to binary strings as the packet profiles. This information includes: Destination IP Address, Source IP Address, Destination Port Number, Duration, Protocol, and Source Port Number [17]. This information is 208

4 extracted from packets and converted to binary strings of 112 bits. Table 1 shows the valid value of each field together with their maximum binary length Trainer Agent After converting all training data sets to binary strings, they are passed to the Trainer Agent to be used for training the detectors. Negative Selection algorithm is used for training the primary detectors. At first, a number of randomly generated strings, called immature detectors, are created and checked with all self-training data sets. If any immature detector matches any of the self packets, then the system will discard it and generate another one in its place. After checking all immature detectors with all self packets, the remaining detector sets undergo the next step of negative-selection algorithm and become mature detectors. Each mature detector will be checked with all non-self packets from training data. If any detector fails to match with some non-self packet, the system will discard this detector; otherwise this detector will be added to our final detector set. This process will continue until all non-self packets are matched with at least three mature detectors. R-Contiguous bit [20] matching role is used to check the matching between two strings. Thus, two bit strings, with the same length, match if they had at least r contiguous identical bits. The process of training the primary detectors is shown in figure 2. Table 1. Depiction of fields in packets profile strings [17] Name of the Field Minimum and Maximum Binary Strings Value Length Destination IP Address bits Source IP Address bits Destination Port No bits Duration seconds 12 bits Protocol bits Source Port No bits Dispatcher Agent After training, all detectors must be sent to all hosts in the network. This is done using a dispatcher agent that has the responsibility to communicate with all hosts and synchronize them according to new changes in detector sets and memory cell detectors. Dispatcher agent also receives the reported signals from sensors and forwards them to the Analyzer Agent to be investigated Analyzer Agent Once an intrusion happens in any host, the detectors will be triggered by matching with the suspected packet. Thus, information about the intrusion, e.g., the number of triggered sensors and their affinity with suspected packet, together with their profile, will be sent to IDS center to be analyzed and acted upon. This will be done by an Analyzer Agent in a detection module. If the number of triggered detectors exceeds a threshold, an intrusion alert is given and they will undergo for generation of memory cell detectors. A genetic algorithm is applied to calculate and generate memory cells with improved ability to detect particular kinds of anomalies. At the same time, the analyzer agent will inform the firewall to block this packet. Also, if the number of triggered detectors is less than a threshold, the packet is marked as suspected packet for the future investigations. After generation of memory cells, they will be passed to the dispatcher agent to send and synchronize the new detectors to sensor agents in each host. When the triggered detectors are sent to the analyzer agent for genetic algorithm, the genetic operation of selection is applied to determine which of the detectors must be cloned to make a primary population. Therefore, a cloning threshold is set by following formula [17]: n is total number of activated detectors. 209

5 Those activated detectors having a fitness value greater than or equal to the cloning threshold undergo cloning. The number of clones to be generated for the candidate detectors is determined by the following formula [17]: 10 Once the process of cloning is complete, the first population for genetic algorithm will be produced. These detectors constitute winner detectors and will be subject to Mutation, Crossover, and Reproduction operations of the genetic algorithm. This process continues until a substantial number of generations is completed. In each generation, the fitness of the whole population is calculated. Once a detector with fitness value higher than that of a winner detector is generated, the genetic algorithm is stopped. The selected detector then becomes a Memory Cell Detector and is added to the Memory Cell Detector set to be sent to each host. If, after a substantial number of generations, no memory cell is generated, then the detector with greatest fitness among winner detectors is selected to become a Memory Cell Detector Host-Side Sensors In order to enhance the detection mechanism and attain higher performance of IDS, the detector sensors are distributed to all hosts in the network. This will also help the IDS to be robust and extendable. Two types of detectors are present in each host: Detector Agents and Memory Cell Agents. A convertor agent also is used in each host to convert profile of packets to binary strings Detector Agent Detector agents comprise a set of trained detectors that have the ability to discriminate between self and non-self packets. All incoming packets will be checked with these detectors. If any detector matches with any packet with an effective affinity then an anomaly will be reported to IDS Center to be investigated. The number of triggered detectors, the fitness of each detector with a suspected packet, and the packet profile are all needed for the analysis in IDS central engine. The concept of a threshold, Ta, is introduced to improve accuracy of detection. If the number of activated detectors is more than threshold Ta, then the session will be closed by local firewall. This can help the IDS to reduce the false-positive errors Memory Cell Agent Memory Cell Agent constitutes the adaptive immune response function for AIS. It is composed of a set of detectors that have been generated in the analyzer agent using its genetic algorithm. The analyzer agent has imbued detectors with more ability and accuracy for detection of some kind of intrusion. Using memory cell detectors will help the system to reduce the detection time and take more rapid action for previously seen intrusions. This also will enhance the performance of the IDS by reducing the processing overhead. Memory cell detectors are an effective way to reduce false-positive and falsenegative errors. Once an anomaly is introduced into a host, and any memory cell detector triggered, the packet will be blocked and detail of intrusion will be reported to IDS Central Engine. The whole analyze and detection process, which is conducted in both server and host sides, is shown in Figure Multi-layer structure of purposed architecture In order to obtain a feasible model to divide a gigantic problem into sub problems that can be solved independently and to enable the intrusion detection system to perform efficiently, intrusion detection is performed in a multilayer mode. Each layer has its own responsibility and detection mechanism that correlates with upper and lower layers to respond automatically to an intrusion. As illustrated in Figure 3, the multilayer architecture consists of three layers [6, 8] Primary Immune Response Layer (PIR) A network firewall is the outermost protection layer of this architecture; it is also the first barrier to prevent network intrusion by attackers. However, not all attacks are detected and prevented by the firewall. It is located in the network gateway and has access to all packets passing from network. It 210

6 controls incoming and outgoing traffic according to the roles that have been set. In one role, it correlates with other layers, which detect intrusions, and receives command from them to block a packet Innate Immune Response Layer (IIR) Innate immune system performs its function in the early period of infection [2]. It is used to detect intrusion behaviors and mark the attacking packets. Innate immunity has anomaly-nonspecific defense mechanisms that a host uses for immediate response to suspected packets. This layer consists of convertor and detector agents in host side and analyzer and alert agents in server side. This helps to reduce the processing overhead by responding to an intrusion in local hosts instead of forcing a server to be responsible for all hosts traffic. As a result, it provides effective and high-speed intrusion detection Adaptive Immune Response Layer (AIR) The adaptive immune Response Layer is composed of distinctive and systemic detectors, called Memory Cell Detectors. This layer has great ability to detect and eliminate the previously seen intrusions. It has anomaly-specific defense mechanisms to detect and block a specific intrusion. Consequently, the Memory Cell Detectors will act as a proactive defense for our IDS. Figure 3. Training of the detectors Figure 5. Multilayered Architecture of IDS Figure 4. Detection procedure flowchart 211

7 4. Experimental Setup As discussed earlier, R-Contiguous matching bit algorithm is used to refine the data against the nonself connections. The fitness value of rc is defined to determine the minimum affinity of two given strings. The different number of rc is examined during the evaluation of the prototype. According to our experiment, for any value less than or equal to 13, in detection stage, a considerable number of self-packets are matched with trained detectors resulting in a high false-positive rate in detection. In addition, for any value lower than 17, the efficiency of the IDS is decreased because most non-self packets fail to match with detectors and result in a high false-negative rate. So the specific value of rc equal to 17 is chosen in R-Contiguous matching bit algorithm. For any amount less than 3 for Ta, IDS blocks some self-connections, so the false-positive rate is increased. Besides, for any amount more than 3 for Ta, some non-self connections fail to trigger enough detectors. Therefore, the activation threshold Ta, for detectors is set to 3 detectors, meaning the minimum of three detectors must be activated for any incoming request to be categorized as anomaly. If the number of activated detectors is less than Ta, an alert will be reported to administrator. By testing the genetic algorithm for generation of memory cells, in different conditions, the probabilities of genetic operations of Crossover, Mutation, and Reproduction have been fixed to 30%, 40% and 30% respectively. 5. Simulation Results By performing the experiment on testing data using trained detectors in each host, we illustrated that the performance of the system is improved by adding new Memory Cell detectors in hosts. In order to analyze the performance of the model, the experiment has been done in 5 different hosts in 10 intervals. Each testing data includes self and non-self connections. The system automatically calculates the falsepositive rate, false-negative rate, and detection rate based on the detection results. The experiment indicates the accuracy of detection is improved in each new round. This is because of generation of new memory cells and their dynamic synchronization and distribution to all of the hosts. Figure 7 illustrates that the detection rate is increased in successive rounds and reaches a relatively stable level at 88.5 percent. It is evident that, by detecting new anomalies and building new memory cells based on the detections, the detection rate is improved. The diagram shows that the detection rate in last rounds reaches a stable level because of limited or no new memory cell generation due to absence of any new type of anomalies in our test data. This can be illustrated in figure 7 that shows the number of memory cells before each round start. In our experiment, we have noticed that the detection rate has dropped in some hosts when the number of anomalies in that round is higher. This problem is reduced in later rounds by the increased number of memory cells. Figure 6. IDS detection rates in 5 hosts with sequential exposures 212

8 Figure 7. Number of generated memory cells with sequential exposures 6. Conclusion During the last few years, the need for additional protection of computer networks from the outside world is evident. Intrusion Detection Systems is the last line of defense of any organization. Recently, Artificial Immune System has attracted more attention by computer security researchers as a new hotspot of biologically inspired computational intelligence. In this study, we presented a new architecture for AIS based IDS. In the resulting model, after generation and training of initial detectors, they are sent to each host as detector agents of this IDS. Memory cells of newly detected anomalies by each host are generated and sent to all hosts to synchronize them. The simulation result shows that numbers of memory cell detectors are dynamically increased and system learns more about new types of anomalies. This gives the system the ability to detect new types of attack. 7. References [1] J. Timmisa, A. Honec, T. Stibord and E. Clarka, Theoretical advances in artificial immune systems.in: Theoretical Computer Science.science direct (1): [2] K.W. Yeom, J.H. Park: An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks. CIS (2) 2005: [2005] [3] L.N. de Castro, J. Timmis. Artificial Immune Systems: A New Computational Intelligence Approach Springer, [4] Yang, J., Liu, X., Tao, L., Liang, G. and Liu, S. Distributed agents model for intrusion detection based on AIS. Knowledge-Based Systems (2): [5] J. D. Farmer, N. H. Packard, and A. S. Perelson. The immune system, adaptation and machine learning. Physica D, 22: , [6] Hosseinpour.F., Abu Bakar.K., Design of a New Distributed Model for Intrusion Detection System Based on Artificial Immune System., 2nd International Conference on Data Mining and Intelligent Information Technology Applications, ISBN: , 2010 [7] Feixian, S. and G. Gaiwen, Research of Immunity-based Anomaly Intrusion Detection and Its Application for Security Evaluation of E-government Affair Systems. JDCTA: International Journal of Digital Content Technology and its Applications, (20): p [8] Hosseinpour.F., Abu Bakar.K., Hatami.A. Kazemi,N., survey on Artificial Immune System as a Bio-Inspired Technique for Anomaly Based Intrusion Detection Systems 2nd international conference on intelligent networking and collaborative systems /10 $ IEEE - DOI /INCOS

9 [9] S. Forrest, A.S. Perelson, L. Allen, R. Cherukuri, Self nonself discrimination in a computer, in: Proc. IEEE Symposium on Research Security and Privacy, 1994, pp [10] S. Hofmeyr, S. Forrest, Architecture for an artificial immune system, Evolutionary Computation 7 (1) (2000) [11] Matzinger, P. The Danger Model: A Renewed Sense of Self. In: Science : [12] Fu, H., Yuan, X. and Hu, L. Design of a four-layer model based on danger theory and AIS for IDS. International Conference on Wireless Communications, Networking and Mobile Computing. IEEE [13] Xishuang, D., et al., Multi-word-Agent Autonomy Learning Based on Adaptive Immune Theories. JDCTA: International Journal of Digital Content Technology and its Applications, (3): p [14] Tan, M., Yu, H., Zhao, Z., Liu, Z. and Liu, F. An artificial immunity-based proactive defense system. International Conference on Robotics and Biomimetics. IEEE [15] Zulkernine, M., and Kannadiga, P. DIDMA: A Distributed Intrusion Detection System Using Mobile Agents. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks. IEEE [16] Chen, G., Y. Wang, and Y. Yang, Community Detection in Complex Networks Using Immune Clone Selection Algorithm. JDCTA: International Journal of Digital Content Technology and its Applications, (6): p [17] Dal, D., Abraham, S., Abraham, A., Sanyal, S. and Sanglikar, M. (2008). Evolution Induced Secondary Immunity An Artificial Immune System based Intrusion Detection System. In: 7th Computer Information Systems and Industrial Management Applications. IEEE. [18] Matzinger, P. The Danger Model in Its Historical Context. In: Scandinavian Journal of Immunology : 4 9. [19] Fanelli, R. L. A Hybrid Model for Immune Inspired Network Intrusion Detection.In: Artificial Immune Systems. Phuket, Thailand [20] Stibor, S. (2008). Foundations of r-contiguous matching in negative selection for anomaly detection. Springer Science, Business Media B.V. [21] Aickelin, U., Bentley, P., Cayzer, S., Kim, J., and McLeod, J. (2003). Danger theory: The link between AIS and IDS? In: 2nd International Conference in Artificial Immune Systems Edinburgh, UK: Springer [22] Ou, C. M., and Ou, C. R. Multi-Agent Artificial Immune Systems (MAAIS) for Intrusion Detection:Abstraction from Danger Theory. In: Agent and Multi-Agent Systems: Technologies and Applications. Berlin: Springer ; [23] Kim, J. W. Integrating Artificial Immune Algorithms for Intrusion Detection. PhD thesis, University College London, [24] Kim, J., Bentley, P. J., Aickelin, U., Greensmith, J., Tedesco, G. and Twycross, J. Immune System Approaches to Intrusion Detection: A Review. Natural Computing, Springer : [25] Braun, P., and Rossak, W., Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit. Heidelberg, Germany: Elsevier Inc. (USA) and dpunkt.verlag (Germany) 214

Artificial Immune System against Viral Attack

Artificial Immune System against Viral Attack Artificial Immune System against Viral Attack Hyungjoon Lee 1, Wonil Kim 2*, and Manpyo Hong 1 1 Digital Vaccine Lab, G,raduated School of Information and Communication Ajou University, Suwon, Republic

More information

A Novel Content Based Image Retrieval Implemented By NSA Of AIS

A Novel Content Based Image Retrieval Implemented By NSA Of AIS A Novel Content Based Image Retrieval Implemented By NSA Of AIS Monika Daga, Kamlesh Lakhwani Abstract: Content Based Image Retrieval system was developed long back, a technique using visual content according

More information

DETECTING MOBILE SPAM BOTNETS USING ARTIFICIAL IMMUNE SYSTEMS

DETECTING MOBILE SPAM BOTNETS USING ARTIFICIAL IMMUNE SYSTEMS Chapter 14 DETECTING MOBILE SPAM BOTNETS USING ARTIFICIAL IMMUNE SYSTEMS Ickin Vural and Hein Venter Abstract Malicious software infects large numbers of computers around the world. Once compromised, the

More information

ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM

ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana, Arturo Ribagorda Department of Computer Science, University Carlos III of Madrid, Avda. Universidad

More information

A Comparative Analysis on the Performance of Particle Swarm Optimization and Artificial Immune Systems for Mathematical Test Functions.

A Comparative Analysis on the Performance of Particle Swarm Optimization and Artificial Immune Systems for Mathematical Test Functions. Australian Journal of Basic and Applied Sciences 3(4): 4344-4350 2009 ISSN 1991-8178 A Comparative Analysis on the Performance of Particle Swarm Optimization and Artificial Immune Systems for Mathematical

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science

Research on Network Security Situation Awareness Technology based on AIS SunJun Liu 1 1 Department of Computer Science International Journal of Knowledge www.ijklp.org and Language Processing AKLP International c2011 ISSN 2191-2734 Volume 2, Number 2, April 2011 pp. 23-34 Research on Network Security Situation Awareness

More information

Distributed Password Manager- Using Secure String Management technique

Distributed Password Manager- Using Secure String Management technique Distributed Password Manager- Using Secure String Management technique Syed Ali Mehdi Assistant Professor, Department of Computer Science, Jamia Hamdard, Delhi, India ABSTRACT: We t to use more complicated

More information

Implementation of a Computer Immune System for Intrusion- and Virus Detection

Implementation of a Computer Immune System for Intrusion- and Virus Detection Implementation of a Computer Immune System for Intrusion- and Virus Detection Markus Christoph Unterleitner office@unterleitner.info February 13, 2006 2 Contents 1. Introduction... 11 1.1 Strategies of

More information

Experiments with Applying Artificial Immune System in Network Attack Detection

Experiments with Applying Artificial Immune System in Network Attack Detection Kennesaw State University DigitalCommons@Kennesaw State University KSU Proceedings on Cybersecurity Education, Research and Practice 2017 KSU Conference on Cybersecurity Education, Research and Practice

More information

A Sense of Danger: Dendritic Cells Inspired Artificial Immune System (AIS) for MANET Security

A Sense of Danger: Dendritic Cells Inspired Artificial Immune System (AIS) for MANET Security A Sense of Danger: Dendritic Cells Inspired Artificial Immune System (AIS) for MANET Security ABSTRACT Nauman Mazhar Deptt of Electrical and Computer Engg Michigan State University MI 48823, USA naumaz@msu.edu

More information

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract)

Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Evolutionary Algorithm Approaches for Detecting Computer Network Intrusion (Extended Abstract) Kevin P. Anchor, Paul D. Williams, Gregg H. Gunsch, and Gary B. Lamont Department of Electrical and Computer

More information

Framework For Cloud Computing Networks Pdf

Framework For Cloud Computing Networks Pdf A Cooperative Intrusion Detection System Framework For Cloud Computing Networks Pdf of Intrusion Detection Systems proposed over the years. Cloud Computing Cloud Computing suffers from various network

More information

Extended Thymus Action for Improving Response of AIS Based NID System against Malicious Traffic

Extended Thymus Action for Improving Response of AIS Based NID System against Malicious Traffic Extended Thymus Action for Improving Response of AIS Based NID System against Malicious Traffic M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi and Muddassar Farooq Abstract Artificial Immune Systems (AISs)

More information

Detecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm

Detecting Resource Consumption Attack over MANET using an Artificial Immune Algorithm Research Journal of Applied Sciences, Engineering and Technology 3(9): 1026-1033, 2011 ISSN: 2040-7467 Maxwell Scientific Organization, 2011 Submitted: July 26, 2011 Accepted: September 05, 2011 Published:

More information

arxiv: v1 [cs.ma] 13 May 2008

arxiv: v1 [cs.ma] 13 May 2008 Distributed Self Management for Distributed Security Systems Michael Hilker arxiv:0805.1785v1 [cs.ma] 13 May 2008 University of Luxembourg Faculty of Science, Technology, and Communications 6, Rue Richard

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN ------------------- CHAPTER 4 DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN In this chapter, MAC layer based defense architecture for RoQ attacks in Wireless LAN

More information

ScienceDirect. A Perception Model of Spam Risk Assessment Inspired by Danger Theory of Artificial Immune Systems

ScienceDirect. A Perception Model of Spam Risk Assessment Inspired by Danger Theory of Artificial Immune Systems Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 59 (2015 ) 152 161 International Conference on Computer Science and Computational Intelligence (ICCSCI 2015) A Perception

More information

The Evolution of System-call Monitoring

The Evolution of System-call Monitoring The Evolution of System-call Monitoring Stephanie Forrest Steven Hofmeyr Anil Somayaji December, 2008 Outline of Talk A sense of self for Unix processes (Review) Emphasize method rather than results Evolutionary

More information

Approach Using Genetic Algorithm for Intrusion Detection System

Approach Using Genetic Algorithm for Intrusion Detection System Approach Using Genetic Algorithm for Intrusion Detection System 544 Abhijeet Karve Government College of Engineering, Aurangabad, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, Maharashtra-

More information

STUDIES ON REAL-VALUED NEGATIVE SELECTION ALGORITHMS FOR SELF-NONSELF DISCRIMINATION

STUDIES ON REAL-VALUED NEGATIVE SELECTION ALGORITHMS FOR SELF-NONSELF DISCRIMINATION STUDIES ON REAL-VALUED NEGATIVE SELECTION ALGORITHMS FOR SELF-NONSELF DISCRIMINATION A Thesis Presented to the Faculty of California Polytechnic State University, San Luis Obispo In Partial Fulfillment

More information

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor

More information

Danger Theory Concepts Improving Malware Detection of Intrusion Detection Systems that uses Exact graphs

Danger Theory Concepts Improving Malware Detection of Intrusion Detection Systems that uses Exact graphs 2015 International Conference on Computational Science and Computational Intelligence Danger Theory Concepts Improving Malware Detection of Intrusion Detection Systems that uses graphs Suhair Amer Department

More information

A New Platform NIDS Based On WEMA

A New Platform NIDS Based On WEMA I.J. Information Technology and Computer Science, 2015, 06, 52-58 Published Online May 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.06.07 A New Platform NIDS Based On WEMA Adnan A.

More information

AN ARTIFICIAL IMMUNE SYSTEM FOR HUMAN- COMPUTER INTERACTION THROUGH SPEECH

AN ARTIFICIAL IMMUNE SYSTEM FOR HUMAN- COMPUTER INTERACTION THROUGH SPEECH AN ARTIFICIAL IMMUNE SYSTEM FOR HUMAN- COMPUTER INTERACTION THROUGH SPEECH Antara Malakar 1 and Tejbanta Singh Chingtham 2 1 Department of Computer Engineering, Sikkim Manipal Institute Of Technolgy, Majitar,

More information

APPLYING SIMILARITIES BETWEEN IMMUNE SYSTEMS AND MOBILE AGENT SYSTEMS IN INTRUSION DETECTION

APPLYING SIMILARITIES BETWEEN IMMUNE SYSTEMS AND MOBILE AGENT SYSTEMS IN INTRUSION DETECTION APPLYING SIMILARITIES BETWEEN IMMUNE SYSTEMS AND MOBILE AGENT SYSTEMS IN INTRUSION DETECTION Marek Zielinski, Lucas Venter School of Computing, University of South Africa Marek Zielinski (contact author):

More information

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM Assosiate professor, PhD Evgeniya Nikolova, BFU Assosiate professor, PhD Veselina Jecheva,

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

A Structural Optimization Method of Genetic Network Programming. for Enhancing Generalization Ability

A Structural Optimization Method of Genetic Network Programming. for Enhancing Generalization Ability International Journal of Engineering Innovation and Management Vol.6, No.2, 2016 A Structural Optimization Method of Genetic Network Programming for Enhancing Generalization Ability Shingo Mabu, Yamaguchi

More information

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra

1. Introduction. 2. Motivation and Problem Definition. Volume 8 Issue 2, February Susmita Mohapatra Pattern Recall Analysis of the Hopfield Neural Network with a Genetic Algorithm Susmita Mohapatra Department of Computer Science, Utkal University, India Abstract: This paper is focused on the implementation

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 15 Outline 1 Introduction Overview History 2 Types

More information

Negative Selection Approach Application in Network Intrusion Detection Systems

Negative Selection Approach Application in Network Intrusion Detection Systems Negative Selection Approach Application in Network Intrusion Detection Systems Amira Sayed A. Aziz Universite Francaise d Egypte (UFE) Scientific Research Group in Egypt (SRGE) Email: amiraabdelaziz@gmail.com

More information

An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization

An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization An Immune Concentration Based Virus Detection Approach Using Particle Swarm Optimization Wei Wang 1,2, Pengtao Zhang 1,2, and Ying Tan 1,2 1 Key Laboratory of Machine Perception, Ministry of Eduction,

More information

Evolving SQL Queries for Data Mining

Evolving SQL Queries for Data Mining Evolving SQL Queries for Data Mining Majid Salim and Xin Yao School of Computer Science, The University of Birmingham Edgbaston, Birmingham B15 2TT, UK {msc30mms,x.yao}@cs.bham.ac.uk Abstract. This paper

More information

Intrusion Detection via Artificial Immune System: a Performance-based Approach

Intrusion Detection via Artificial Immune System: a Performance-based Approach Intrusion Detection via Artificial Immune System: a Performance-based Approach Andrea Visconti, Nicoló Fusi, Hooman Tahayori Abstract In this paper, we discuss the design and engineering of a biologicallyinspired,

More information

Evolutionary Multi-objective Optimization of Business Process Designs with Pre-processing

Evolutionary Multi-objective Optimization of Business Process Designs with Pre-processing Evolutionary Multi-objective Optimization of Business Process Designs with Pre-processing Kostas Georgoulakos Department of Applied Informatics University of Macedonia Thessaloniki, Greece mai16027@uom.edu.gr

More information

DDoS Attacks Detection Using GA based Optimized Traffic Matrix

DDoS Attacks Detection Using GA based Optimized Traffic Matrix 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing DDoS Attacks Detection Using GA based Optimized Traffic Matrix Je Hak Lee yitsup2u@gmail.com Dong

More information

Mobile Agent Routing for Query Retrieval Using Genetic Algorithm

Mobile Agent Routing for Query Retrieval Using Genetic Algorithm 1 Mobile Agent Routing for Query Retrieval Using Genetic Algorithm A. Selamat a, b, M. H. Selamat a and S. Omatu b a Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia,

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding e Scientific World Journal, Article ID 746260, 8 pages http://dx.doi.org/10.1155/2014/746260 Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding Ming-Yi

More information

A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2

A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2 Chapter 5 A Genetic Algorithm for Graph Matching using Graph Node Characteristics 1 2 Graph Matching has attracted the exploration of applying new computing paradigms because of the large number of applications

More information

Web page recommendation using a stochastic process model

Web page recommendation using a stochastic process model Data Mining VII: Data, Text and Web Mining and their Business Applications 233 Web page recommendation using a stochastic process model B. J. Park 1, W. Choi 1 & S. H. Noh 2 1 Computer Science Department,

More information

ET-based Test Data Generation for Multiple-path Testing

ET-based Test Data Generation for Multiple-path Testing 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 ET-based Test Data Generation for Multiple-path Testing Qingjie Wei* College of Computer

More information

COLLABORATIVE AGENT LEARNING USING HYBRID NEUROCOMPUTING

COLLABORATIVE AGENT LEARNING USING HYBRID NEUROCOMPUTING COLLABORATIVE AGENT LEARNING USING HYBRID NEUROCOMPUTING Saulat Farooque and Lakhmi Jain School of Electrical and Information Engineering, University of South Australia, Adelaide, Australia saulat.farooque@tenix.com,

More information

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid

An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid Demin Wang 2, Hong Zhu 1, and Xin Liu 2 1 College of Computer Science and Technology, Jilin University, Changchun

More information

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 97 CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 5.1 INTRODUCTION Fuzzy systems have been applied to the area of routing in ad hoc networks, aiming to obtain more adaptive and flexible

More information

Integrating Innate and Adaptive Immunity for Intrusion Detection

Integrating Innate and Adaptive Immunity for Intrusion Detection Integrating Innate and Adaptive Immunity for Intrusion Detection Gianni Tedesco 1, Jamie Twycross 1, and Uwe Aickelin 1 School of Computer Science & IT (ASAP) University of Nottingham NG8 1BB gxt,jpt,uxa@cs.nott.ac.uk

More information

Immune Optimization Design of Diesel Engine Valve Spring Based on the Artificial Fish Swarm

Immune Optimization Design of Diesel Engine Valve Spring Based on the Artificial Fish Swarm IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-661, p- ISSN: 2278-8727Volume 16, Issue 4, Ver. II (Jul-Aug. 214), PP 54-59 Immune Optimization Design of Diesel Engine Valve Spring Based on

More information

Mahalanobis Distance Map Approach for Anomaly Detection

Mahalanobis Distance Map Approach for Anomaly Detection Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2010 Mahalanobis Distance Map Approach for Anomaly Detection Aruna Jamdagnil

More information

Computational Intelligence Applied on Cryptology: a Brief Review

Computational Intelligence Applied on Cryptology: a Brief Review Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence

More information

An Immunity-Based Anomaly Detection System with Sensor Agents

An Immunity-Based Anomaly Detection System with Sensor Agents Sensors 9, 9, 9175-9195; doi:.339/s919175 OPEN ACCESS sensors ISSN 1424-82 www.mdpi.com/journal/sensors Article An Immunity-Based Anomaly Detection System with Sensor Agents Takeshi Okamoto 1, * and Yoshiteru

More information

Input Data Processing Techniques in Intrusion Detection Systems Short Review

Input Data Processing Techniques in Intrusion Detection Systems Short Review P a g e 15 Vol. 9 Issue 5 (Ver 2.0), January 2010 Global Journal of Computer Science and Technology Input Data Processing Techniques in Intrusion Detection Systems Short Review Suhair H. Amer, and John

More information

Inducing Parameters of a Decision Tree for Expert System Shell McESE by Genetic Algorithm

Inducing Parameters of a Decision Tree for Expert System Shell McESE by Genetic Algorithm Inducing Parameters of a Decision Tree for Expert System Shell McESE by Genetic Algorithm I. Bruha and F. Franek Dept of Computing & Software, McMaster University Hamilton, Ont., Canada, L8S4K1 Email:

More information

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management *

A Rule-Based Intrusion Alert Correlation System for Integrated Security Management * A Rule-Based Intrusion Correlation System for Integrated Security Management * Seong-Ho Lee 1, Hyung-Hyo Lee 2, and Bong-Nam Noh 1 1 Department of Computer Science, Chonnam National University, Gwangju,

More information

Random Neural Networks for the Adaptive Control of Packet Networks

Random Neural Networks for the Adaptive Control of Packet Networks Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.

More information

Distributed Optimization of Feature Mining Using Evolutionary Techniques

Distributed Optimization of Feature Mining Using Evolutionary Techniques Distributed Optimization of Feature Mining Using Evolutionary Techniques Karthik Ganesan Pillai University of Dayton Computer Science 300 College Park Dayton, OH 45469-2160 Dale Emery Courte University

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of GA and PSO over Economic Load Dispatch Problem Sakshi Rajpoot sakshirajpoot1988@gmail.com Dr. Sandeep Bhongade sandeepbhongade@rediffmail.com Abstract Economic Load dispatch problem

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network A Genetic-Neural Approach for obility Assisted Routing in a obile Encounter Network Niko P. Kotilainen, Jani Kurhinen Abstract--obility assisted routing (AR) is a concept, where the mobility of a network

More information

An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems

An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems Algirdas Avižienis Vytautas Magnus University, Kaunas, Lithuania and University of California, Los

More information

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization 2017 2 nd International Electrical Engineering Conference (IEEC 2017) May. 19 th -20 th, 2017 at IEP Centre, Karachi, Pakistan Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Activating Intrusion Prevention Service

Activating Intrusion Prevention Service Activating Intrusion Prevention Service Intrusion Prevention Service Overview Configuring Intrusion Prevention Service Intrusion Prevention Service Overview Intrusion Prevention Service (IPS) delivers

More information

Evolutionary Mobile Agents

Evolutionary Mobile Agents Evolutionary Mobile Agents Assistant Barna Iantovics Petru Maior University of Tg. Mureş Abstract. We denote evolutionary agents the agents that can solve problems using methods based on evolutionary computation.

More information

GENETIC ALGORITHM METHOD FOR COMPUTER AIDED QUALITY CONTROL

GENETIC ALGORITHM METHOD FOR COMPUTER AIDED QUALITY CONTROL 3 rd Research/Expert Conference with International Participations QUALITY 2003, Zenica, B&H, 13 and 14 November, 2003 GENETIC ALGORITHM METHOD FOR COMPUTER AIDED QUALITY CONTROL Miha Kovacic, Miran Brezocnik

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

Information Security Coding Rule Based on Neural Network and Greedy Algorithm and Application in Network Alarm Detection

Information Security Coding Rule Based on Neural Network and Greedy Algorithm and Application in Network Alarm Detection 2016 4 th International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2016) ISBN: 978-1-60595-412-7 Information Security Coding Rule Based on Neural Network and Greedy Algorithm

More information

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements Ondrej Linda, Milos Manic, Miles McQueen Abstract: This paper presents design and simulation of a low cost and low

More information

1. INTRODUCTION. In 2002 the Computer Security Institute reported that 99% of corporations

1. INTRODUCTION. In 2002 the Computer Security Institute reported that 99% of corporations 1 1. INTRODUCTION In 2002 the Computer Security Institute reported that 99% of corporations and government agencies experienced some kind of security violation [1]. As computer use expands in the coming

More information

Review of feature selection techniques in bioinformatics by Yvan Saeys, Iñaki Inza and Pedro Larrañaga.

Review of feature selection techniques in bioinformatics by Yvan Saeys, Iñaki Inza and Pedro Larrañaga. Americo Pereira, Jan Otto Review of feature selection techniques in bioinformatics by Yvan Saeys, Iñaki Inza and Pedro Larrañaga. ABSTRACT In this paper we want to explain what feature selection is and

More information

On the Idea of a New Artificial Intelligence Based Optimization Algorithm Inspired From the Nature of Vortex

On the Idea of a New Artificial Intelligence Based Optimization Algorithm Inspired From the Nature of Vortex On the Idea of a New Artificial Intelligence Based Optimization Algorithm Inspired From the Nature of Vortex Utku Kose Computer Sciences Application and Research Center Usak University, Usak, Turkey utku.kose@usak.edu.tr

More information

A Review on Network Intrusion Detection using Artificial Immune System (AIS)

A Review on Network Intrusion Detection using Artificial Immune System (AIS) A Review on Network Intrusion Detection using Artificial Immune System (AIS) 1. Vijeta, 2. Mr. Vivek Sharma 1. M.Tech Scholar(C.S.E), JMIT Radaur,Haryana,India 2. Head of the Deptt(C.S.E Deptt), JMIT Radaur,

More information

Systematic Detection And Resolution Of Firewall Policy Anomalies

Systematic Detection And Resolution Of Firewall Policy Anomalies Systematic Detection And Resolution Of Firewall Policy Anomalies 1.M.Madhuri 2.Knvssk Rajesh Dept.of CSE, Kakinada institute of Engineering & Tech., Korangi, kakinada, E.g.dt, AP, India. Abstract: In this

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

Design and Implementation of an Intrusion Prevention System

Design and Implementation of an Intrusion Prevention System International Journal of Network Security, Vol.19, No.5, PP.675-683, Sept. 2017 (DOI: 10.6633/IJNS.201709.19(5).04) 675 Design and Implementation of an Intrusion Prevention System Yousef Farhaoui (Corresponding

More information

Improvement of Handoff in Mobile WiMAX Networks Using Mobile Agents

Improvement of Handoff in Mobile WiMAX Networks Using Mobile Agents Improvement of Handoff in Mobile WiMAX Networks Using Mobile Agents Gabriel STOIAN Faculty of Mathematics and Informatics Department of Informatics 13 A.I. Cuza Street ROMANIA gstoian@yahoo.com Abstract:

More information

City, University of London Institutional Repository

City, University of London Institutional Repository City Research Online City, University of London Institutional Repository Citation: Andrienko, N., Andrienko, G., Fuchs, G., Rinzivillo, S. & Betz, H-D. (2015). Real Time Detection and Tracking of Spatial

More information

Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows

Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows Denial of Service (DoS) Attack Detection by Using Fuzzy Logic over Network Flows S. Farzaneh Tabatabaei 1, Mazleena Salleh 2, MohammadReza Abbasy 3 and MohammadReza NajafTorkaman 4 Faculty of Computer

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

A Survey And Comparative Analysis Of Data

A Survey And Comparative Analysis Of Data A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Improved Signature-Based Antivirus System

Improved Signature-Based Antivirus System Improved Signature-Based Antivirus System Osaghae E. O. Department of Computer Science Federal University, Lokoja, Kogi State, Nigeria Abstract: The continuous updating of antivirus database with malware

More information

Security improvement in IOT based on Software

Security improvement in IOT based on Software International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 122 Security improvement in IOT based on Software Raghavendra Reddy, Manoj Kumar, Dr K K Sharma Abstract With the

More information

An advanced data leakage detection system analyzing relations between data leak activity

An advanced data leakage detection system analyzing relations between data leak activity An advanced data leakage detection system analyzing relations between data leak activity Min-Ji Seo 1 Ph. D. Student, Software Convergence Department, Soongsil University, Seoul, 156-743, Korea. 1 Orcid

More information

A Web Page Recommendation system using GA based biclustering of web usage data

A Web Page Recommendation system using GA based biclustering of web usage data A Web Page Recommendation system using GA based biclustering of web usage data Raval Pratiksha M. 1, Mehul Barot 2 1 Computer Engineering, LDRP-ITR,Gandhinagar,cepratiksha.2011@gmail.com 2 Computer Engineering,

More information

Negative Selection as a Means of Discovering Unknown Temporal Patterns

Negative Selection as a Means of Discovering Unknown Temporal Patterns Negative Selection as a Means of Discovering Unknown Temporal Patterns Wanli Ma, Dat Tran, and Dharmendra Sharma Abstract The temporal nature of negative selection is an under exploited area. In a negative

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

CYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta

CYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta CYBER ANALYTICS Architecture Overview Technical Brief May 2016 novetta.com 2016, Novetta Novetta Cyber Analytics: Technical Architecture Overview 1 INTRODUCTION 2 CAPTURE AND PROCESS ALL NETWORK TRAFFIC

More information

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE

AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China

More information

Solving Traveling Salesman Problem Using Parallel Genetic. Algorithm and Simulated Annealing

Solving Traveling Salesman Problem Using Parallel Genetic. Algorithm and Simulated Annealing Solving Traveling Salesman Problem Using Parallel Genetic Algorithm and Simulated Annealing Fan Yang May 18, 2010 Abstract The traveling salesman problem (TSP) is to find a tour of a given number of cities

More information

Information Diffusion in a Single-Hop Mobile Peer-to-Peer Network

Information Diffusion in a Single-Hop Mobile Peer-to-Peer Network Information Diffusion in a Single-Hop Mobile Peer-to-Peer Network Jani Kurhinen and Jarkko Vuori University of Jyväskylä Department of Mathematical Information Technology B.O.Box 35 (Agora) FIN-40014 University

More information

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK P.Priya 1, S.Tamilvanan 2 1 M.E-Computer Science and Engineering Student, Bharathidasan Engineering College, Nattrampalli. 2

More information

A Machine Learning Evaluation of an Artificial Immune System

A Machine Learning Evaluation of an Artificial Immune System A Machine Learning Evaluation of an Artificial Immune System Matthew Glickman glickman@cs.unm.edu Department of Computer Science, University of New Mexico, Albuquerque, NM 87131-1386, USA Justin Balthrop

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

A study of hybridizing Population based Meta heuristics

A study of hybridizing Population based Meta heuristics Volume 119 No. 12 2018, 15989-15994 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A study of hybridizing Population based Meta heuristics Dr.J.Arunadevi 1, R.Uma 2 1 Assistant Professor,

More information

Deriving Trading Rules Using Gene Expression Programming

Deriving Trading Rules Using Gene Expression Programming 22 Informatica Economică vol. 15, no. 1/2011 Deriving Trading Rules Using Gene Expression Programming Adrian VISOIU Academy of Economic Studies Bucharest - Romania Economic Informatics Department - collaborator

More information